The rail fence cipher (also called a zigzag cipher) is a classical type of transposition cipher. It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails. (Wikipedia).
Symmetric Key Cryptography: The Rail Fence Cipher
This is the third in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a transposition cipher called the rail fence cipher, also known as the zig zag cipher. It explains how this method can be used to scramble the letters in a pl
From playlist Cryptography
Pseudorandom Number Generation and Stream Ciphers
Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.
From playlist Network Security
Block Ciphers and Data Encryption Standard (DES) - Part 1
Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles
From playlist Network Security
The Art and Science of Secret Messages: Some Glimpses (ONLINE) by Geetha Venkataraman
KAAPI WITH KURIOSITY THE ART AND SCIENCE OF SECRET MESSAGES: SOME GLIMPSES (ONLINE) SPEAKER: Geetha Venkataraman (Dr. B. R. Ambedkar University Delhi, Delhi) WHEN: 4:00 pm to 5:30 pm Sunday, 19 September 2021 WHERE: Livestream via the ICTS YouTube channel Abstract:- In the modern worl
From playlist Kaapi With Kuriosity (A Monthly Public Lecture Series)
Block Ciphers and Data Encryption Standard (DES): Part 2
Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.
From playlist Network Security
Symmetric Key Cryptography: Cryptographic Techniques
This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical operation can be used to encrypt at the bit level in symmetric key cryptography, then shows how this can be combined with permutation step
From playlist Cryptography
Transport Layer Security: Part 2 - TLS & HTTPS
Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.
From playlist Network Security
Transport Layer Security: Part 1
Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.
From playlist Network Security
Doggie Aggression (Full Episode) | Cesar Millan: Better Human, Better Dog
Cesar intervenes when dog brothers draw blood - a Doberman who continuously causes fights with his packmate and a Jindo-Pit Mix that’s a nervous wreck. ➡ Subscribe: http://bit.ly/NatGeoWILDSubscribe ➡ Get more Nat Geo Wild Full Episodes: https://youtu.be/qAG2SkTPltw ➡ Get more Nat Geo Ful
From playlist Cesar Millan | National Geographic
RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor
RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor Secrets are out. Credentials are in. This new Rails 5.2 feature offers a number of advantages over the old way of managing secrets. You get atomic deploys, you avoid putting sensitive data on envir
From playlist RailsConf 2018
DEFCON 19: Steganography and Cryptography 101
Speaker: eskimo There are a lot of great ways to hide your data from prying eyes this talk will give a crash course in the technology and some tools that can be used to secure your data. Will also discuss hiding your files in plain site so an intruder will have no idea that hidden files
From playlist DEFCON 19
This video is a brief introduction to linear codes: dimensions, G (generating matrix), H (parity check matrix), their forms. Also gives an example of how to convert between G and H. Here is the formal definition of a Linear Code: A linear code of dimension k and length n over a field
From playlist Cryptography and Coding Theory
Kaggle Coffee Chat: Phil Culliton | Kaggle
Kaggle Coffee Chats are casual peer-to-peer conversations with Kaggle Data Scientists. Our first conversation is with Walter Reade, also know as inversion. We talk about upcoming competitions, exciting new methods in data science and our favorite caffeinated beverages. SUBSCRIBE: http://w
From playlist Kaggle Coffee Chat | Kaggle
Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.
From playlist Network Security
I know Kung Fu! (or neo4j on Rails without jRuby)
"Reality is a graph, embrace it!" Sure graph databases are really cool and have a timestamp dated next week, but do you know when you should actually use one? Sometimes living on the bleeding edge pays off and in this talk, I'll show you how you can simplify your application and model your
From playlist Cascadia Ruby 2012
RailsConf 2019 - Modern Cryptography for the Absolute Beginner by Jeffrey Cohen
RailsConf 2019 - Modern Cryptography for the Absolute Beginner by Jeffrey Cohen _______________________________________________________________________________________________ Cloud 66 - Pain Free Rails Deployments Cloud 66 for Rails acts like your in-house DevOps team to build, deploy and
From playlist RailsConf 2019
What to do with all those old PCBs from stuff you've taken apart...
From playlist Projects & Installations
Securing Your Site by Thomas Pomfret
Rails makes it very easy to rapidly develop web applications, but doesn't always make it so simple to deploy or secure them. This talk is going to focus on best practices to secure your rails application, learnt through multiple high profile projects and penetration tests. The talk will b
From playlist Rails Conf 2012